vendor:
bmon
by:
Idan Nahoum
7.5
CVSS
HIGH
Local Privilege Escalation
264
CWE
Product Name: bmon
Affected Version From: < 1.2.1_2
Affected Version To: < 1.2.1_2
Patch Exists: NO
Related CWE: CVE-2004-2059
CPE: a:bmon:bmon:1.2.1
Platforms Tested: FreeBSD, OpenBSD
2004
Local Privilege Escalation in bmon
This exploit is for FreeBSD/OpenBSD systems with bmon version less than 1.2.1_2 installed. When bmon is executed with the -n parameter, it uses popen() to execute netcat without providing an absolute path. Some BSDs have ACLs that do not allow setuid files to run unless explicitly allowed. Therefore, creating a file called netcat and chmod'ing +s bash would not work. In order to get a usable shell, stdout needs to be redirected to stderr (as stdout is closed), and the stty settings need to be restored. The exploit takes advantage of this vulnerability to execute a shell with elevated privileges.
Mitigation:
Upgrade to bmon version 1.2.1_2 or later. Ensure that the PATH environment variable is properly set and does not include any untrusted or malicious directories. Consider implementing stricter ACLs to prevent unauthorized execution of setuid files.